An Error Occurred When Checking For Live Patch Updates

Asked by Andres Ounpuu

Getting this message on LivePatch "An Error Occurred When Checking For Live Patch Updates" i have watched video, followed the links, changed tokens, disable and enabling it again. Refreshing snaps, sudo apt update&&upgrade -ing in terminal still there is a shield icon with a red dot in upper corner...I am using 18.04.2 LTS . Here is a text in the ERROR "Canonical Livepatch has experienced an internal error. Please refer to https://wiki.ubuntu.com/Kernel/Livepatch#CommonIssues for further information."
Whitch leads to no solution. Could someone help me a little?

Question information

Language:
English Edit question
Status:
Answered
For:
Ubuntu Edit question
Assignee:
No assignee Edit question
Last query:
Last reply:
Revision history for this message
actionparsnip (andrew-woodhead666) said :
#1

What is the full output of:

sudo apt-get update
sudo apt-get upgrade

Thanks

Revision history for this message
Swarup Dev (dinbandhu) said :
#2

I have the same issue as described above. And there is the same shield icon with a red dot in the upper right corner of the screen. As requested, here is the output of the above terminal commands:

:~$ sudo apt-get update
[sudo] password for swarup:
Hit:1 http://ppa.launchpad.net/christian-boxdoerfer/fsearch-daily/ubuntu bionic InRelease
Hit:2 http://archive.ubuntu.com/ubuntu bionic InRelease
Hit:3 http://archive.canonical.com/ubuntu bionic InRelease
Get:4 http://archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB]
Get:5 http://archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB]
Get:6 http://archive.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Get:7 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages [656 kB]
Hit:8 http://linux.teamviewer.com/deb stable InRelease
Get:9 http://archive.ubuntu.com/ubuntu bionic-updates/main i386 Packages [542 kB]
Get:10 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 DEP-11 Metadata [278 kB]
Get:11 http://archive.ubuntu.com/ubuntu bionic-updates/main DEP-11 48x48 Icons [66.7 kB]
Get:12 http://archive.ubuntu.com/ubuntu bionic-updates/main DEP-11 64x64 Icons [132 kB]
Get:13 http://archive.ubuntu.com/ubuntu bionic-updates amd64 Contents (deb) [35.0 MB]
Get:14 http://archive.ubuntu.com/ubuntu bionic-updates i386 Contents (deb) [24.2 MB]
Get:15 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 Packages [955 kB]
Get:16 http://archive.ubuntu.com/ubuntu bionic-updates/universe i386 Packages [941 kB]
Get:17 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 DEP-11 Metadata [239 kB]
Get:18 http://archive.ubuntu.com/ubuntu bionic-updates/universe DEP-11 48x48 Icons [190 kB]
Get:19 http://archive.ubuntu.com/ubuntu bionic-updates/universe DEP-11 64x64 Icons [420 kB]
Get:20 http://archive.ubuntu.com/ubuntu bionic-updates/multiverse amd64 DEP-11 Metadata [2,464 B]
Get:21 http://archive.ubuntu.com/ubuntu bionic-backports/universe amd64 DEP-11 Metadata [7,224 B]
Get:22 http://archive.ubuntu.com/ubuntu bionic-security/main amd64 DEP-11 Metadata [17.9 kB]
Get:23 http://archive.ubuntu.com/ubuntu bionic-security/main DEP-11 48x48 Icons [10.4 kB]
Get:24 http://archive.ubuntu.com/ubuntu bionic-security/main DEP-11 64x64 Icons [25.6 kB]
Get:25 http://archive.ubuntu.com/ubuntu bionic-security/universe amd64 DEP-11 Metadata [36.2 kB]
Get:26 http://archive.ubuntu.com/ubuntu bionic-security/universe DEP-11 48x48 Icons [16.4 kB]
Get:27 http://archive.ubuntu.com/ubuntu bionic-security/universe DEP-11 64x64 Icons [99.2 kB]
Get:28 http://archive.ubuntu.com/ubuntu bionic-security/multiverse amd64 DEP-11 Metadata [2,464 B]
Fetched 64.1 MB in 24s (2,653 kB/s)
Reading package lists... Done
swarup@Baba:~$ sudo apt-get upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer required:
  ethtool lib32gcc1 libc6-i386 libcuda1-340 libxnvctrl0 nvidia-settings
  pkg-config screen-resolution-extra
Use 'sudo apt autoremove' to remove them.
The following packages have been kept back:
  linux-generic linux-generic-hwe-18.04 linux-headers-generic
  linux-headers-generic-hwe-18.04 linux-image-generic
  linux-image-generic-hwe-18.04
The following packages will be upgraded:
  gedit gedit-common gnome-shell gnome-shell-common libnss-myhostname
  libnss-systemd libpam-systemd libpython2.7 libpython2.7-minimal
  libpython2.7-stdlib libpython3.6 libpython3.6-minimal libpython3.6-stdlib
  libruby2.5 libssl1.1 libssl1.1:i386 libsystemd0 libsystemd0:i386 libudev1
  libudev1:i386 linux-libc-dev linux-signed-generic-hwe-18.04 openssl
  python2.7 python2.7-minimal python3.6 python3.6-minimal ruby2.5 systemd
  systemd-sysv udev
31 upgraded, 0 newly installed, 0 to remove and 6 not upgraded.
Need to get 23.8 MB of archives.
After this operation, 266 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libnss-systemd amd64 237-3ubuntu10.22 [105 kB]
Get:2 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libudev1 amd64 237-3ubuntu10.22 [53.8 kB]
Get:3 http://archive.ubuntu.com/ubuntu bionic-updates/main i386 libudev1 i386 237-3ubuntu10.22 [57.3 kB]
Get:4 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 udev amd64 237-3ubuntu10.22 [1,101 kB]
Get:5 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libnss-myhostname amd64 237-3ubuntu10.22 [34.0 kB]
Get:6 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpam-systemd amd64 237-3ubuntu10.22 [108 kB]
Get:7 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 systemd amd64 237-3ubuntu10.22 [2,901 kB]
Get:8 http://archive.ubuntu.com/ubuntu bionic-updates/main i386 libsystemd0 i386 237-3ubuntu10.22 [221 kB]
Get:9 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libsystemd0 amd64 237-3ubuntu10.22 [204 kB]
Get:10 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 systemd-sysv amd64 237-3ubuntu10.22 [11.7 kB]
Get:11 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpython3.6 amd64 3.6.8-1~18.04.1 [1,418 kB]
Get:12 http://archive.ubuntu.com/ubuntu bionic-updates/main i386 libssl1.1 i386 1.1.1-1ubuntu2.1~18.04.2 [1,297 kB]
Get:13 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libssl1.1 amd64 1.1.1-1ubuntu2.1~18.04.2 [1,295 kB]
Get:14 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 python3.6 amd64 3.6.8-1~18.04.1 [202 kB]
Get:15 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 python3.6-minimal amd64 3.6.8-1~18.04.1 [1,620 kB]
Get:16 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpython3.6-stdlib amd64 3.6.8-1~18.04.1 [1,715 kB]
Get:17 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpython3.6-minimal amd64 3.6.8-1~18.04.1 [533 kB]
Get:18 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpython2.7 amd64 2.7.15-4ubuntu4~18.04 [1,053 kB]
Get:19 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 python2.7 amd64 2.7.15-4ubuntu4~18.04 [239 kB]
Get:20 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpython2.7-stdlib amd64 2.7.15-4ubuntu4~18.04 [1,915 kB]
Get:21 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 python2.7-minimal amd64 2.7.15-4ubuntu4~18.04 [1,295 kB]
Get:22 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libpython2.7-minimal amd64 2.7.15-4ubuntu4~18.04 [335 kB]
Get:23 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 openssl amd64 1.1.1-1ubuntu2.1~18.04.2 [614 kB]
Get:24 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 gedit-common all 3.28.1-1ubuntu1.2 [137 kB]
Get:25 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 gedit amd64 3.28.1-1ubuntu1.2 [408 kB]
Get:26 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 gnome-shell amd64 3.28.4-0ubuntu18.04.1 [667 kB]
Get:27 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 gnome-shell-common all 3.28.4-0ubuntu18.04.1 [184 kB]
Get:28 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libruby2.5 amd64 2.5.1-1ubuntu1.4 [3,068 kB]
Get:29 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 linux-libc-dev amd64 4.15.0-52.56 [1,004 kB]
Get:30 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 linux-signed-generic-hwe-18.04 amd64 4.18.0.22.72 [1,904 B]
Get:31 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 ruby2.5 amd64 2.5.1-1ubuntu1.4 [48.6 kB]
Fetched 23.8 MB in 4s (6,794 kB/s)
Extracting templates from packages: 100%
Preconfiguring packages ...
(Reading database ... 233716 files and directories currently installed.)
Preparing to unpack .../libnss-systemd_237-3ubuntu10.22_amd64.deb ...
Unpacking libnss-systemd:amd64 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../libudev1_237-3ubuntu10.22_i386.deb ...
De-configuring libudev1:amd64 (237-3ubuntu10.21) ...
Unpacking libudev1:i386 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../libudev1_237-3ubuntu10.22_amd64.deb ...
Unpacking libudev1:amd64 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Setting up libudev1:amd64 (237-3ubuntu10.22) ...
Setting up libudev1:i386 (237-3ubuntu10.22) ...
(Reading database ... 233716 files and directories currently installed.)
Preparing to unpack .../0-udev_237-3ubuntu10.22_amd64.deb ...
Unpacking udev (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../1-libnss-myhostname_237-3ubuntu10.22_amd64.deb ...
Unpacking libnss-myhostname:amd64 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../2-libpam-systemd_237-3ubuntu10.22_amd64.deb ...
Unpacking libpam-systemd:amd64 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../3-systemd_237-3ubuntu10.22_amd64.deb ...
Unpacking systemd (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../4-libsystemd0_237-3ubuntu10.22_amd64.deb ...
De-configuring libsystemd0:i386 (237-3ubuntu10.21) ...
Unpacking libsystemd0:amd64 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../5-libsystemd0_237-3ubuntu10.22_i386.deb ...
Unpacking libsystemd0:i386 (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Setting up libsystemd0:amd64 (237-3ubuntu10.22) ...
Setting up libsystemd0:i386 (237-3ubuntu10.22) ...
Setting up systemd (237-3ubuntu10.22) ...
(Reading database ... 233716 files and directories currently installed.)
Preparing to unpack .../00-systemd-sysv_237-3ubuntu10.22_amd64.deb ...
Unpacking systemd-sysv (237-3ubuntu10.22) over (237-3ubuntu10.21) ...
Preparing to unpack .../01-libpython3.6_3.6.8-1~18.04.1_amd64.deb ...
Unpacking libpython3.6:amd64 (3.6.8-1~18.04.1) over (3.6.7-1~18.04) ...
Preparing to unpack .../02-libssl1.1_1.1.1-1ubuntu2.1~18.04.2_amd64.deb ...
De-configuring libssl1.1:i386 (1.1.1-1ubuntu2.1~18.04.1) ...
Unpacking libssl1.1:amd64 (1.1.1-1ubuntu2.1~18.04.2) over (1.1.1-1ubuntu2.1~18.04.1) ...
Preparing to unpack .../03-libssl1.1_1.1.1-1ubuntu2.1~18.04.2_i386.deb ...
Unpacking libssl1.1:i386 (1.1.1-1ubuntu2.1~18.04.2) over (1.1.1-1ubuntu2.1~18.04.1) ...
Preparing to unpack .../04-python3.6_3.6.8-1~18.04.1_amd64.deb ...
Unpacking python3.6 (3.6.8-1~18.04.1) over (3.6.7-1~18.04) ...
Preparing to unpack .../05-python3.6-minimal_3.6.8-1~18.04.1_amd64.deb ...
Unpacking python3.6-minimal (3.6.8-1~18.04.1) over (3.6.7-1~18.04) ...
Preparing to unpack .../06-libpython3.6-stdlib_3.6.8-1~18.04.1_amd64.deb ...
Unpacking libpython3.6-stdlib:amd64 (3.6.8-1~18.04.1) over (3.6.7-1~18.04) ...
Preparing to unpack .../07-libpython3.6-minimal_3.6.8-1~18.04.1_amd64.deb ...
Unpacking libpython3.6-minimal:amd64 (3.6.8-1~18.04.1) over (3.6.7-1~18.04) ...
Preparing to unpack .../08-libpython2.7_2.7.15-4ubuntu4~18.04_amd64.deb ...
Unpacking libpython2.7:amd64 (2.7.15-4ubuntu4~18.04) over (2.7.15~rc1-1ubuntu0.1) ...
Preparing to unpack .../09-python2.7_2.7.15-4ubuntu4~18.04_amd64.deb ...
Unpacking python2.7 (2.7.15-4ubuntu4~18.04) over (2.7.15~rc1-1ubuntu0.1) ...
Preparing to unpack .../10-libpython2.7-stdlib_2.7.15-4ubuntu4~18.04_amd64.deb ...
Unpacking libpython2.7-stdlib:amd64 (2.7.15-4ubuntu4~18.04) over (2.7.15~rc1-1ubuntu0.1) ...
Preparing to unpack .../11-python2.7-minimal_2.7.15-4ubuntu4~18.04_amd64.deb ...
Unpacking python2.7-minimal (2.7.15-4ubuntu4~18.04) over (2.7.15~rc1-1ubuntu0.1) ...
Preparing to unpack .../12-libpython2.7-minimal_2.7.15-4ubuntu4~18.04_amd64.deb ...
Unpacking libpython2.7-minimal:amd64 (2.7.15-4ubuntu4~18.04) over (2.7.15~rc1-1ubuntu0.1) ...
Preparing to unpack .../13-openssl_1.1.1-1ubuntu2.1~18.04.2_amd64.deb ...
Unpacking openssl (1.1.1-1ubuntu2.1~18.04.2) over (1.1.0g-2ubuntu4.3) ...
Preparing to unpack .../14-gedit-common_3.28.1-1ubuntu1.2_all.deb ...
Unpacking gedit-common (3.28.1-1ubuntu1.2) over (3.28.1-1ubuntu1.1) ...
Preparing to unpack .../15-gedit_3.28.1-1ubuntu1.2_amd64.deb ...
Unpacking gedit (3.28.1-1ubuntu1.2) over (3.28.1-1ubuntu1.1) ...
Preparing to unpack .../16-gnome-shell_3.28.4-0ubuntu18.04.1_amd64.deb ...
Unpacking gnome-shell (3.28.4-0ubuntu18.04.1) over (3.28.3+git20190124-0ubuntu18.04.2) ...
Preparing to unpack .../17-gnome-shell-common_3.28.4-0ubuntu18.04.1_all.deb ...
Unpacking gnome-shell-common (3.28.4-0ubuntu18.04.1) over (3.28.3+git20190124-0ubuntu18.04.2) ...
Preparing to unpack .../18-libruby2.5_2.5.1-1ubuntu1.4_amd64.deb ...
Unpacking libruby2.5:amd64 (2.5.1-1ubuntu1.4) over (2.5.1-1ubuntu1.2) ...
Preparing to unpack .../19-linux-libc-dev_4.15.0-52.56_amd64.deb ...
Unpacking linux-libc-dev:amd64 (4.15.0-52.56) over (4.15.0-51.55) ...
Preparing to unpack .../20-linux-signed-generic-hwe-18.04_4.18.0.22.72_amd64.deb ...
Unpacking linux-signed-generic-hwe-18.04 (4.18.0.22.72) over (4.18.0.21.71) ...
Preparing to unpack .../21-ruby2.5_2.5.1-1ubuntu1.4_amd64.deb ...
Unpacking ruby2.5 (2.5.1-1ubuntu1.4) over (2.5.1-1ubuntu1.2) ...
Setting up libnss-systemd:amd64 (237-3ubuntu10.22) ...
Processing triggers for mime-support (3.60ubuntu1) ...
Processing triggers for ureadahead (0.100.0-21) ...
ureadahead will be reprofiled on next reboot
Setting up libnss-myhostname:amd64 (237-3ubuntu10.22) ...
Processing triggers for desktop-file-utils (0.23-1ubuntu3.18.04.2) ...
Setting up systemd-sysv (237-3ubuntu10.22) ...
Processing triggers for libglib2.0-0:amd64 (2.56.4-0ubuntu0.18.04.3) ...
Processing triggers for libglib2.0-0:i386 (2.56.4-0ubuntu0.18.04.3) ...
Setting up linux-libc-dev:amd64 (4.15.0-52.56) ...
Setting up linux-signed-generic-hwe-18.04 (4.18.0.22.72) ...
Setting up gnome-shell-common (3.28.4-0ubuntu18.04.1) ...
Processing triggers for libc-bin (2.27-3ubuntu1) ...
Setting up udev (237-3ubuntu10.22) ...
update-initramfs: deferring update (trigger activated)
Setting up libssl1.1:amd64 (1.1.1-1ubuntu2.1~18.04.2) ...
Checking for services that may need to be restarted...done.
Checking for services that may need to be restarted...done.
Setting up libssl1.1:i386 (1.1.1-1ubuntu2.1~18.04.2) ...
Checking for services that may need to be restarted...done.
Checking for services that may need to be restarted...done.
Setting up gedit-common (3.28.1-1ubuntu1.2) ...
Setting up openssl (1.1.1-1ubuntu2.1~18.04.2) ...
Installing new version of config file /etc/ssl/openssl.cnf ...
Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
Processing triggers for gnome-menus (3.13.3-11ubuntu1.1) ...
Processing triggers for dbus (1.12.2-1ubuntu1.1) ...
Setting up libpython2.7-minimal:amd64 (2.7.15-4ubuntu4~18.04) ...
Processing triggers for hicolor-icon-theme (0.17-2) ...
Setting up libpython2.7-stdlib:amd64 (2.7.15-4ubuntu4~18.04) ...
Setting up python2.7-minimal (2.7.15-4ubuntu4~18.04) ...
Setting up libruby2.5:amd64 (2.5.1-1ubuntu1.4) ...
Setting up libpam-systemd:amd64 (237-3ubuntu10.22) ...
Setting up python2.7 (2.7.15-4ubuntu4~18.04) ...
Setting up gnome-shell (3.28.4-0ubuntu18.04.1) ...
Setting up libpython3.6-minimal:amd64 (3.6.8-1~18.04.1) ...
Setting up libpython2.7:amd64 (2.7.15-4ubuntu4~18.04) ...
Setting up libpython3.6-stdlib:amd64 (3.6.8-1~18.04.1) ...
Setting up ruby2.5 (2.5.1-1ubuntu1.4) ...
Setting up python3.6-minimal (3.6.8-1~18.04.1) ...
Setting up libpython3.6:amd64 (3.6.8-1~18.04.1) ...
Setting up python3.6 (3.6.8-1~18.04.1) ...
Setting up gedit (3.28.1-1ubuntu1.2) ...
Processing triggers for initramfs-tools (0.130ubuntu3.8) ...
update-initramfs: Generating /boot/initrd.img-4.18.0-21-generic
Processing triggers for libc-bin (2.27-3ubuntu1) ...
:~$

Revision history for this message
actionparsnip (andrew-woodhead666) said :
#3

OK. Is there an issue still?

Revision history for this message
Swarup Dev (dinbandhu) said :
#4

Well, I restarted the computer after that, and there is still the same shield icon with a red dot in the upper right corner of the screen. When I click on that, I still get the same message: "Canonical Livepatch has experienced an internal error. Please refer to https://wiki.ubuntu.com/Kernel/Livepatch#CommonIssues for further information."

Revision history for this message
Swarup Dev (dinbandhu) said :
#5

Update: The red dot on the shield is now gone, and in its place there is a green one. So it seems all is well.

Is there a way to remove the shield icon though? I really don't need it. Thank you!

Revision history for this message
actionparsnip (andrew-woodhead666) said :
#6

Can you please give a screenshot. You will need to use a Web hosting service to make a URL of the image (or find a similar one online)

Revision history for this message
Swarup Dev (dinbandhu) said :
#7
Revision history for this message
actionparsnip (andrew-woodhead666) said :
#8

gsettings set com.ubuntu.update-notifier show-livepatch-status-icon false

Source:
https://askubuntu.com/questions/1142910/how-can-i-remove-live-patch-notification

Revision history for this message
Swarup Dev (dinbandhu) said :
#9

Great job, thank you. Worked perfectly.

Revision history for this message
actionparsnip (andrew-woodhead666) said :
#10

I don't use desktop Linux. I just searched the Web.....

Revision history for this message
Andres Ounpuu (aoandres) said :
#11

my issue still remains after update&&ugrade

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo apt update
[sudo] password for andres:
Ign:1 cdrom://Ubuntu 18.04 LTS _Bionic Beaver_ - Release amd64 (20180426) bionic InRelease
Err:2 cdrom://Ubuntu 18.04 LTS _Bionic Beaver_ - Release amd64 (20180426) bionic Release
  Please use apt-cdrom to make this CD-ROM recognized by APT. apt-get update cannot be used to add new CD-ROMs
Ign:3 http://dl.google.com/linux/chrome/deb stable InRelease
Hit:4 http://repo.yandex.ru/yandex-disk/deb stable InRelease
Hit:5 http://archive.ubuntu.com/ubuntu bionic InRelease
Hit:6 http://archive.canonical.com/ubuntu bionic InRelease
Hit:7 https://installer.id.ee/media/ubuntu bionic InRelease
Ign:8 http://dl.google.com/linux/earth/deb stable InRelease
Get:9 http://archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB]
Hit:10 http://ppa.launchpad.net/alexlarsson/flatpak/ubuntu bionic InRelease
Get:11 http://dl.google.com/linux/chrome/deb stable Release [943 B]
Hit:12 http://packages.microsoft.com/repos/vscode stable InRelease
Hit:13 http://dl.google.com/linux/earth/deb stable Release
Hit:14 http://ppa.launchpad.net/kdenlive/kdenlive-stable/ubuntu bionic InRelease
Get:15 http://dl.google.com/linux/chrome/deb stable Release.gpg [819 B]
Get:16 http://archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB]
Hit:17 https://packages.microsoft.com/ubuntu/18.04/prod bionic InRelease
Hit:18 http://ppa.launchpad.net/papirus/papirus/ubuntu bionic InRelease
Get:19 http://archive.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Hit:20 http://ppa.launchpad.net/peterlevi/ppa/ubuntu bionic InRelease
Hit:21 http://ppa.launchpad.net/slytomcat/ppa/ubuntu bionic InRelease
Hit:22 http://ppa.launchpad.net/teejee2008/ppa/ubuntu bionic InRelease
Get:25 http://dl.google.com/linux/chrome/deb stable/main amd64 Packages [1,108 B]
Hit:24 https://packagecloud.io/slacktechnologies/slack/debian jessie InRelease
Get:26 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages [658 kB]
Get:27 http://archive.ubuntu.com/ubuntu bionic-updates/main i386 Packages [544 kB]
Get:28 http://archive.ubuntu.com/ubuntu bionic-updates/main Translation-en [243 kB]
Get:29 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 DEP-11 Metadata [278 kB]
Get:30 http://archive.ubuntu.com/ubuntu bionic-updates/main DEP-11 48x48 Icons [66.7 kB]
Get:31 http://archive.ubuntu.com/ubuntu bionic-updates/main DEP-11 64x64 Icons [127 kB]
Get:32 http://archive.ubuntu.com/ubuntu bionic-updates/universe i386 Packages [942 kB]
Get:33 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 Packages [956 kB]
Get:34 http://archive.ubuntu.com/ubuntu bionic-updates/universe Translation-en [282 kB]
Get:35 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 DEP-11 Metadata [245 kB]
Get:36 http://archive.ubuntu.com/ubuntu bionic-updates/universe DEP-11 48x48 Icons [197 kB]
Get:37 http://archive.ubuntu.com/ubuntu bionic-updates/universe DEP-11 64x64 Icons [417 kB]
Get:38 http://archive.ubuntu.com/ubuntu bionic-updates/multiverse amd64 DEP-11 Metadata [2,464 B]
Get:39 http://archive.ubuntu.com/ubuntu bionic-backports/universe amd64 DEP-11 Metadata [7,224 B]
Get:40 http://archive.ubuntu.com/ubuntu bionic-security/main i386 Packages [327 kB]
Get:41 http://archive.ubuntu.com/ubuntu bionic-security/main amd64 Packages [430 kB]
Get:42 http://archive.ubuntu.com/ubuntu bionic-security/main Translation-en [150 kB]
Get:43 http://archive.ubuntu.com/ubuntu bionic-security/main amd64 DEP-11 Metadata [17.9 kB]
Get:44 http://archive.ubuntu.com/ubuntu bionic-security/main DEP-11 48x48 Icons [10.4 kB]
Get:45 http://archive.ubuntu.com/ubuntu bionic-security/main DEP-11 64x64 Icons [25.6 kB]
Get:46 http://archive.ubuntu.com/ubuntu bionic-security/universe amd64 Packages [568 kB]
Get:47 http://archive.ubuntu.com/ubuntu bionic-security/universe i386 Packages [561 kB]
Get:48 http://archive.ubuntu.com/ubuntu bionic-security/universe Translation-en [184 kB]
Get:49 http://archive.ubuntu.com/ubuntu bionic-security/universe amd64 DEP-11 Metadata [36.1 kB]
Get:50 http://archive.ubuntu.com/ubuntu bionic-security/universe DEP-11 48x48 Icons [16.4 kB]
Get:51 http://archive.ubuntu.com/ubuntu bionic-security/universe DEP-11 64x64 Icons [104 kB]
Get:52 http://archive.ubuntu.com/ubuntu bionic-security/multiverse amd64 DEP-11 Metadata [2,464 B]
Reading package lists... Done
E: The repository 'cdrom://Ubuntu 18.04 LTS _Bionic Beaver_ - Release amd64 (20180426) bionic Release' does not have a Release file.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
N: Skipping acquire of configured file 'main/binary-i386/Packages' as repository 'http://dl.google.com/linux/earth/deb stable InRelease' doesn't support architecture 'i386'
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo apt upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer required:
  linux-headers-4.15.0-51 linux-headers-4.15.0-51-generic
  linux-tools-4.15.0-51 linux-tools-4.15.0-51-generic
Use 'sudo apt autoremove' to remove them.
The following packages will be upgraded:
  evince evince-common libevdocument3-4 libevview3-3 libsqlite3-0
5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 1,210 kB of archives.
After this operation, 9,216 B of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libsqlite3-0 amd64 3.22.0-1ubuntu0.1 [497 kB]
Get:2 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 evince amd64 3.28.4-0ubuntu1.2 [256 kB]
Get:3 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libevdocument3-4 amd64 3.28.4-0ubuntu1.2 [223 kB]
Get:4 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 evince-common all 3.28.4-0ubuntu1.2 [113 kB]
Get:5 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 libevview3-3 amd64 3.28.4-0ubuntu1.2 [120 kB]
Fetched 1,210 kB in 0s (2,887 kB/s)
(Reading database ... 298835 files and directories currently installed.)
Preparing to unpack .../libsqlite3-0_3.22.0-1ubuntu0.1_amd64.deb ...
Unpacking libsqlite3-0:amd64 (3.22.0-1ubuntu0.1) over (3.22.0-1) ...
Preparing to unpack .../evince_3.28.4-0ubuntu1.2_amd64.deb ...
Unpacking evince (3.28.4-0ubuntu1.2) over (3.28.4-0ubuntu1.1) ...
Preparing to unpack .../libevdocument3-4_3.28.4-0ubuntu1.2_amd64.deb ...
Unpacking libevdocument3-4:amd64 (3.28.4-0ubuntu1.2) over (3.28.4-0ubuntu1.1) ...
Preparing to unpack .../evince-common_3.28.4-0ubuntu1.2_all.deb ...
Unpacking evince-common (3.28.4-0ubuntu1.2) over (3.28.4-0ubuntu1.1) ...
Preparing to unpack .../libevview3-3_3.28.4-0ubuntu1.2_amd64.deb ...
Unpacking libevview3-3:amd64 (3.28.4-0ubuntu1.2) over (3.28.4-0ubuntu1.1) ...
Processing triggers for gconf2 (3.2.6-4ubuntu1) ...
Processing triggers for mime-support (3.60ubuntu1) ...
Processing triggers for desktop-file-utils (0.23-1ubuntu3.18.04.2) ...
Processing triggers for libglib2.0-0:amd64 (2.56.4-0ubuntu0.18.04.3) ...
Setting up libevdocument3-4:amd64 (3.28.4-0ubuntu1.2) ...
Setting up evince-common (3.28.4-0ubuntu1.2) ...
Processing triggers for libc-bin (2.27-3ubuntu1) ...
Setting up libevview3-3:amd64 (3.28.4-0ubuntu1.2) ...
Setting up libsqlite3-0:amd64 (3.22.0-1ubuntu0.1) ...
Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
Processing triggers for gnome-menus (3.13.3-11ubuntu1.1) ...
Processing triggers for hicolor-icon-theme (0.17-2) ...
Setting up evince (3.28.4-0ubuntu1.2) ...
Installing new version of config file /etc/apparmor.d/abstractions/evince ...
Installing new version of config file /etc/apparmor.d/usr.bin.evince ...
Processing triggers for libc-bin (2.27-3ubuntu1) ...
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

any suggestions?

Revision history for this message
Andres Ounpuu (aoandres) said :
#12
Revision history for this message
actionparsnip (andrew-woodhead666) said :
#13

Remove the CD as a package source. You have the web

Revision history for this message
Andres Ounpuu (aoandres) said :
#14

[sudo] password for andres:
Ign:1 cdrom://Ubuntu 18.04 LTS _Bionic Beaver_ - Release amd64 (20180426) bionic InRelease
Err:2 cdrom://Ubuntu 18.04 LTS _Bionic Beaver_ - Release amd64 (20180426) bionic Release
  Please use apt-cdrom to make this CD-ROM recognized by APT. apt-get update cannot be used to add new CD-ROMs
Ign:3 http://dl.google.com/linux/chrome/deb stable InRelease
Hit:4 http://repo.yandex.ru/yandex-disk/deb stable InRelease
Hit:5 http://ppa.launchpad.net/alexlarsson/flatpak/ubuntu bionic InRelease
Ign:6 http://dl.google.com/linux/earth/deb stable InRelease
Hit:7 https://installer.id.ee/media/ubuntu bionic InRelease
Hit:8 http://dl.google.com/linux/chrome/deb stable Release
Hit:9 http://packages.microsoft.com/repos/vscode stable InRelease
Hit:10 http://ppa.launchpad.net/kdenlive/kdenlive-stable/ubuntu bionic InRelease
Hit:11 http://dl.google.com/linux/earth/deb stable Release
Hit:12 http://archive.ubuntu.com/ubuntu bionic InRelease
Hit:13 https://packages.microsoft.com/ubuntu/18.04/prod bionic InRelease
Hit:14 http://ppa.launchpad.net/papirus/papirus/ubuntu bionic InRelease
Hit:15 http://archive.canonical.com/ubuntu bionic InRelease
Hit:16 http://archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:17 http://ppa.launchpad.net/peterlevi/ppa/ubuntu bionic InRelease
Hit:18 http://ppa.launchpad.net/slytomcat/ppa/ubuntu bionic InRelease
Hit:19 http://archive.ubuntu.com/ubuntu bionic-backports InRelease
Hit:20 http://ppa.launchpad.net/teejee2008/ppa/ubuntu bionic InRelease
Hit:21 http://archive.ubuntu.com/ubuntu bionic-security InRelease
Hit:22 https://packagecloud.io/slacktechnologies/slack/debian jessie InRelease
Reading package lists... Done
E: The repository 'cdrom://Ubuntu 18.04 LTS _Bionic Beaver_ - Release amd64 (20180426) bionic Release' does not have a Release file.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
N: Skipping acquire of configured file 'main/binary-i386/Packages' as repository 'http://dl.google.com/linux/earth/deb stable InRelease' doesn't support architecture 'i386'
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ clear

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo apt update
Hit:1 http://repo.yandex.ru/yandex-disk/deb stable InRelease
Ign:2 http://dl.google.com/linux/chrome/deb stable InRelease
Hit:3 http://archive.ubuntu.com/ubuntu bionic InRelease
Hit:4 http://ppa.launchpad.net/alexlarsson/flatpak/ubuntu bionic InRelease
Hit:5 http://packages.microsoft.com/repos/vscode stable InRelease
Hit:6 http://archive.canonical.com/ubuntu bionic InRelease
Ign:7 http://dl.google.com/linux/earth/deb stable InRelease
Hit:8 https://installer.id.ee/media/ubuntu bionic InRelease
Get:9 http://archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB]
Hit:10 http://dl.google.com/linux/chrome/deb stable Release
Hit:11 http://dl.google.com/linux/earth/deb stable Release
Hit:12 http://ppa.launchpad.net/kdenlive/kdenlive-stable/ubuntu bionic InRelease
Hit:13 https://packages.microsoft.com/ubuntu/18.04/prod bionic InRelease
Hit:14 http://ppa.launchpad.net/papirus/papirus/ubuntu bionic InRelease
Get:15 http://archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB]
Get:16 http://archive.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Hit:17 http://ppa.launchpad.net/peterlevi/ppa/ubuntu bionic InRelease
Hit:18 http://ppa.launchpad.net/slytomcat/ppa/ubuntu bionic InRelease
Hit:19 http://ppa.launchpad.net/teejee2008/ppa/ubuntu bionic InRelease
Hit:20 https://packagecloud.io/slacktechnologies/slack/debian jessie InRelease
Fetched 252 kB in 5s (54.5 kB/s)
Reading package lists... Done
Building dependency tree
Reading state information... Done
All packages are up to date.
N: Skipping acquire of configured file 'main/binary-i386/Packages' as repository 'http://dl.google.com/linux/earth/deb stable InRelease' doesn't support architecture 'i386'
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo canonical-livepatch refresh
Before refresh:

kernel: 4.15.0-23.25-generic
fully-patched: false
version: "42.1"

After refresh:

kernel: 4.15.0-23.25-generic
fully-patched: false
version: "42.1"

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

DONE!But the problem is still there...how did the guy before me got rid of it?I still don't get it

Revision history for this message
Manfred Hampl (m-hampl) said :
#15

@Andres Ounpuu:
You have to comment out the CD as possible repository source in your /etc/apt/sources.list configuration file
and you have to change the line for google earth from
deb http://dl.google.com/linux/earth/deb/ stable main
into
deb [arch=amd64] http://dl.google.com/linux/earth/deb/ stable main
(It is probably in /etc/apt/sources.list.d/google-earth.list)

Revision history for this message
Andres Ounpuu (aoandres) said :
#16

so i opted out on google-earth updates updates look clean now bu issue still remain

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo apt update
[sudo] password for andres:
Hit:1 http://repo.yandex.ru/yandex-disk/deb stable InRelease
Hit:2 https://installer.id.ee/media/ubuntu bionic InRelease
Hit:3 http://ppa.launchpad.net/alexlarsson/flatpak/ubuntu bionic InRelease
Hit:4 http://packages.microsoft.com/repos/vscode stable InRelease
Hit:5 http://archive.canonical.com/ubuntu bionic InRelease
Hit:6 http://archive.ubuntu.com/ubuntu bionic InRelease
Hit:7 http://ppa.launchpad.net/kdenlive/kdenlive-stable/ubuntu bionic InRelease
Hit:8 http://ppa.launchpad.net/papirus/papirus/ubuntu bionic InRelease
Hit:9 https://packages.microsoft.com/ubuntu/18.04/prod bionic InRelease
Get:10 http://archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB]
Hit:11 http://ppa.launchpad.net/peterlevi/ppa/ubuntu bionic InRelease
Hit:12 http://ppa.launchpad.net/slytomcat/ppa/ubuntu bionic InRelease
Hit:13 http://ppa.launchpad.net/teejee2008/ppa/ubuntu bionic InRelease
Get:14 http://archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB]
Get:16 http://archive.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Hit:15 https://packagecloud.io/slacktechnologies/slack/debian jessie InRelease
Get:17 http://archive.ubuntu.com/ubuntu bionic-updates/main i386 Packages [544 kB]
Get:18 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages [658 kB]
Get:19 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 Packages [958 kB]
Get:20 http://archive.ubuntu.com/ubuntu bionic-updates/universe i386 Packages [943 kB]
Fetched 3,355 kB in 7s (496 kB/s)
Reading package lists... Done
Building dependency tree
Reading state information... Done
All packages are up to date.
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo apt upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

also tried to turn on livepatch with "verbose" command and this is what i got

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo canonical-livepatch status --verbose
client-version: 9.4.1
machine-id: 540ab72cec1e48658b4a355d6959df74
machine-token: 41ce4dc6fd64494ab31fa27600286798
architecture: x86_64
cpu-model: AMD A9-9420 RADEON R5, 5 COMPUTE CORES 2C+3G
last-check: 2019-06-21T10:42:45+03:00
boot-time: 2019-06-20T19:44:01+03:00
uptime: 15h16m54s
status:
- kernel: 4.15.0-23.25-generic
  running: true
  livepatch:
    checkState: checked
    patchState: apply-failed
    version: "42.1"
    fixes: |-
      * CVE-2018-10323
        The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in
        the Linux kernel through 4.16.3 allows local users to cause a denial of
        service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs
        image.
      * CVE-2018-10840
        Linux kernel is vulnerable to a heap-based buffer overflow in the
        fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could
        exploit this by operating on a mounted crafted ext4 image.
      * CVE-2018-10881
        A flaw was found in the Linux kernel's ext4 filesystem. A local user
        can cause an out-of-bound access in ext4_get_group_info function, a
        denial of service, and a system crash by mounting and operating on a
        crafted ext4 filesystem image.
      * CVE-2018-1092
        The ext4_iget function in fs/ext4/inode.c in the Linux kernel through
        4.15.15 mishandles the case of a root directory with a zero
        i_links_count, which allows attackers to cause a denial of service
        (ext4_process_freed_data NULL pointer dereference and OOPS) via a
        crafted ext4 image." "Improper input validation bug in DNS resolver
        component of Knot Resolver before 2.4.1 allows remote attacker to
        poison cache." "Certain input files may trigger an integer overflow in
        ttembed input file processing. This overflow could potentially lead to
        corruption of the input file due to a lack of checking return codes of
        fgetc/fputc function calls." "An input validation flaw exists in
        ttembed. With a crafted input file, an attacker may be able to trigger
        a denial of service condition due to ttembed trusting attacker
        controlled values." "** RESERVED cvelist lib tardir usr This candidate
        has been reserved by an organization or individual that will use it
        when announcing a new security problem. When the candidate has been
        publicized, the details for this candidate will be provided." "**
        RESERVED cvelist lib tardir usr This candidate has been reserved by an
        organization or individual that will use it when announcing a new
        security problem. When the candidate has been publicized, the details
        for this candidate will be provided." "It was discovered that
        PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24
        failed to properly check authorization on certain statements involved
        with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE
        TABLE" privileges could exploit this to read arbitrary bytes server
        memory. If the attacker also had certain "INSERT" and limited "UPDATE"
        privileges to a particular table, they could exploit this to update
        other columns in the same table." "** RESERVED cvelist lib tardir usr
        This candidate has been reserved by an organization or individual that
        will use it when announcing a new security problem. When the candidate
        has been publicized, the details for this candidate will be provided."
        "** RESERVED cvelist lib tardir usr This candidate has been reserved by
        an organization or individual that will use it when announcing a new
        security problem. When the candidate has been publicized, the details
        for this candidate will be provided." "** RESERVED cvelist lib tardir
        usr This candidate has been reserved by an organization or individual
        that will use it when announcing a new security problem. When the
        candidate has been publicized, the details for this candidate will be
        provided." "** RESERVED cvelist lib tardir usr This candidate has been
        reserved by an organization or individual that will use it when
        announcing a new security problem. When the candidate has been
        publicized, the details for this candidate will be provided.
      * CVE-2018-1094
        The ext4_fill_super function in fs/ext4/super.c in the Linux kernel
        through 4.15.15 does not always initialize the crc32c checksum driver,
        which allows attackers to cause a denial of service
        (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a
        crafted ext4 image." "The cdrom_ioctl_media_changed function in
        drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local
        attackers to use a incorrect bounds check in the CDROM driver
        CDROM_MEDIA_CHANGED ioctl to read out kernel memory." "** RESERVED
        cvelist lib tardir usr This candidate has been reserved by an
        organization or individual that will use it when announcing a new
        security problem. When the candidate has been publicized, the details
        for this candidate will be provided."
        "modules/attributewizardpro/file_upload.php in the Attribute Wizard
        addon 1.6.9 for PrestaShop 1.4.0.1 through 1.6.1.18 allows remote
        attackers to execute arbitrary code by uploading a .phtml file." "An
        issue was discovered on Barco ClickShare CSE-200 and CS-100 Base Units
        with firmware before 1.6.0.3. Sending an arbitrary unexpected string to
        TCP port 7100 respecting a certain frequency timing disconnects all
        clients and results in a crash of the Unit." "The request_dividend
        function of a smart contract implementation for ROC (aka Rasputin
        Online Coin), an Ethereum ERC20 token, allows attackers to steal all of
        the contract's Ether." "The mg_handle_cgi function in mongoose.c in
        Mongoose 6.11 allows remote attackers to cause a denial of service
        (heap-based buffer over-read and application crash, or NULL pointer
        dereference) via an HTTP request, related to the mbuf_insert function."
        "** RESERVED cvelist lib tardir usr This candidate has been reserved by
        an organization or individual that will use it when announcing a new
        security problem. When the candidate has been publicized, the details
        for this candidate will be provided." "** RESERVED cvelist lib tardir
        usr This candidate has been reserved by an organization or individual
        that will use it when announcing a new security problem. When the
        candidate has been publicized, the details for this candidate will be
        provided." "** RESERVED cvelist lib tardir usr This candidate has been
        reserved by an organization or individual that will use it when
        announcing a new security problem. When the candidate has been
        publicized, the details for this candidate will be provided." "mailboxd
        in Zimbra Collaboration Suite 8.8 before 8.8.8; 8.7 before
        8.7.11.Patch3; and 8.6 allows Account Enumeration by leveraging a
        Discrepancy between the "HTTP 404 - account is not active" and "HTTP
        401 - must authenticate" errors.
      * CVE-2018-11412
        In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in
        fs/ext4/inline.c performs a memcpy with an untrusted length value in
        certain circumstances involving a crafted filesystem that stores the
        system.data extended attribute value in a dedicated inode.
      * CVE-2018-11506
        The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel
        through 4.16.12 allows local users to cause a denial of service
        (stack-based buffer overflow) or possibly have unspecified other impact
        because sense buffers have different sizes at the CDROM layer and the
        SCSI layer, as demonstrated by a CDROMREADMODE2 ioctl call.
      * CVE-2018-12233
        In the ea_get function in fs/jfs/xattr.c in the Linux kernel through
        4.17.1, a memory corruption bug in JFS can be triggered by calling
        setxattr twice with two different extended attribute names on the same
        file. This vulnerability can be triggered by an unprivileged user with
        the ability to create files and execute programs. A kmalloc call is
        incorrect, leading to slab-out-of-bounds in jfs_xattr.
      * CVE-2018-13094
        An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux
        kernel through 4.17.3. An OOPS may occur for a corrupted xfs image
        after xfs_da_shrink_inode() is called with a NULL bp.
      * CVE-2018-13405
        The inode_init_owner function in fs/inode.c in the Linux kernel through
        4.17.4 allows local users to create files with an unintended group
        ownership, in a scenario where a directory is SGID to a certain group
        and is writable by a user who is not a member of that group. Here, the
        non-member can trigger creation of a plain file whose group ownership
        is that group. The intended behavior was that the non-member can
        trigger creation of a directory (but not a plain file) whose group
        ownership is that group. The non-member can escalate privileges by
        making the plain file executable and SGID.
      * CVE-2018-13406
        An integer overflow in the uvesafb_setcmap function in
        drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could
        result in local attackers being able to crash the kernel or potentially
        elevate privileges because kmalloc_array is not used.
      * CVE-2018-5390
        Linux kernel versions 4.9+ can be forced to make very expensive calls
        to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every
        incoming packet which can lead to a denial of service.
      * CVE-2018-5391
        cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate
        has been reserved by an organization or individual that will use it
        when announcing a new security problem. When the candidate has been
        publicized, the details for this candidate will be provided.
      * CVE-2018-7755
        An issue was discovered in the fd_locked_ioctl function in
        drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy
        driver will copy a kernel pointer to user memory in response to the
        FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the
        obtained kernel pointer to discover the location of kernel code and
        data and bypass kernel security protections such as KASLR.
      * CVE-2018-8087
        Memory leak in the hwsim_new_radio_nl function in
        drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through
        4.15.9 allows local users to cause a denial of service (memory
        consumption) by triggering an out-of-array error case.

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

Revision history for this message
Manfred Hampl (m-hampl) said :
#17

Are there any messages about livepatch in the system logs?

Revision history for this message
Andres Ounpuu (aoandres) said :
#18

did you mean this?

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ sudo canonical-livepatch logs
[sudo] password for andres:
NAME:
   canonical-livepatch - canonical livepatch client

USAGE:
   canonical-livepatch [global options] command [command options] [arguments...]

VERSION:
   9.4.1

AUTHOR:
   Canonical Livepatch Team

COMMANDS:
     status show kernel's livepatch status
     enable enable livepatching on the machine
     disable disable livepatching on the machine
     refresh immediately download and apply any available livepatch
     config configure livepatching on the machine
     help display help

GLOBAL OPTIONS:
   --version, -v print the version
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

Revision history for this message
Manfred Hampl (m-hampl) said :
#19

I was referring to something like

dmesg | grep livepatch
snap logs canonical-livepatch

Revision history for this message
Andres Ounpuu (aoandres) said :
#20

SURE...

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ dmesg | grep livepatch
[ 3665.562037] audit: type=1400 audit(1561109041.152:55): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=15611 comm="apparmor_parser"
[ 3665.572067] audit: type=1400 audit(1561109041.160:56): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=15614 comm="apparmor_parser"
[ 3665.578716] audit: type=1400 audit(1561109041.168:57): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=15615 comm="apparmor_parser"
[ 3665.581189] audit: type=1400 audit(1561109041.168:58): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=15617 comm="apparmor_parser"
[ 3666.904289] audit: type=1400 audit(1561109042.492:63): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=15641 comm="apparmor_parser"
[ 3666.938168] audit: type=1400 audit(1561109042.528:64): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=15640 comm="apparmor_parser"
[ 3671.132819] audit: type=1400 audit(1561109046.721:71): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=15773 comm="apparmor_parser"
[ 3671.193280] audit: type=1400 audit(1561109046.785:72): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=15774 comm="apparmor_parser"
[ 3671.201790] audit: type=1400 audit(1561109046.793:73): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=15778 comm="apparmor_parser"
[ 3671.203778] audit: type=1400 audit(1561109046.793:74): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=15779 comm="apparmor_parser"
[ 3674.837497] audit: type=1400 audit(1561109050.429:79): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=15908 comm="apparmor_parser"
[ 3674.908657] audit: type=1400 audit(1561109050.497:80): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=15907 comm="apparmor_parser"
[ 3676.730939] audit: type=1400 audit(1561109052.321:95): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=15967 comm="apparmor_parser"
[ 3676.787212] audit: type=1400 audit(1561109052.377:96): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=15966 comm="apparmor_parser"
[ 3676.795555] audit: type=1400 audit(1561109052.385:97): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=15970 comm="apparmor_parser"
[ 3676.797734] audit: type=1400 audit(1561109052.389:98): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=15971 comm="apparmor_parser"
[ 3698.424873] audit: type=1400 audit(1561109074.017:103): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=16195 comm="apparmor_parser"
[ 3698.767448] audit: type=1400 audit(1561109074.357:104): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=16198 comm="apparmor_parser"
[ 3698.789512] audit: type=1400 audit(1561109074.381:105): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=16196 comm="apparmor_parser"
[ 3699.020342] audit: type=1400 audit(1561109074.613:106): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=16199 comm="apparmor_parser"
[ 3704.653353] audit: type=1400 audit(1561109080.245:112): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=16409 comm="apparmor_parser"
[ 3704.655584] audit: type=1400 audit(1561109080.245:113): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=16408 comm="apparmor_parser"
[ 3704.668448] audit: type=1400 audit(1561109080.261:114): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=16412 comm="apparmor_parser"
[ 3704.671493] audit: type=1400 audit(1561109080.261:115): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=16413 comm="apparmor_parser"
[ 3705.173469] audit: type=1400 audit(1561109080.765:120): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=16432 comm="apparmor_parser"
[ 3705.181827] audit: type=1400 audit(1561109080.773:121): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=16435 comm="apparmor_parser"
[ 3709.661114] audit: type=1400 audit(1561109085.253:138): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=16601 comm="apparmor_parser"
[ 3709.662915] audit: type=1400 audit(1561109085.253:139): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=16602 comm="apparmor_parser"
[ 3710.572869] audit: type=1400 audit(1561109086.165:144): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatch" pid=16626 comm="apparmor_parser"
[ 3710.638986] audit: type=1400 audit(1561109086.229:145): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.canonical-livepatch.canonical-livepatchd" pid=16627 comm="apparmor_parser"
[ 3710.646867] audit: type=1400 audit(1561109086.237:146): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.canonical-livepatch" pid=16631 comm="apparmor_parser"
[ 3710.648991] audit: type=1400 audit(1561109086.241:147): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.canonical-livepatch.hook.configure" pid=16632 comm="apparmor_parser"
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$ snap logs canonical-livepatch
2019-06-21T09:26:37Z canonical-livepatch[16663]: touched last check
2019-06-21T09:26:39Z canonical-livepatch[16663]: Applying update 42.1 for 4.15.0-23.25-generic
2019-06-21T09:26:39Z canonical-livepatch[16663]: during refresh: cannot apply patches: cannot apply update: cannot execute finitModule syscall: required key not available
2019-06-21T09:26:39Z canonical-livepatch[16663]: failure when getting status: apply-failed
2019-06-21T09:26:39Z canonical-livepatch[16663]: failure when getting status: apply-failed
2019-06-21T09:26:39Z canonical-livepatch[16663]: failure when getting status: apply-failed
2019-06-21T09:26:39Z canonical-livepatch[16663]: failure when getting status: apply-failed
2019-06-21T09:26:42Z canonical-livepatch[16663]: failure when getting status: apply-failed
2019-06-21T09:26:42Z canonical-livepatch[16663]: failure when getting status: apply-failed
2019-06-21T09:26:42Z canonical-livepatch[16663]: failure when getting status: apply-failed
andres@andres-HP-Pavilion-Laptop-15-cd0xx:~$

aah maan that does not look good

Revision history for this message
Manfred Hampl (m-hampl) said :
#21

seems to be the same problem as
https://askubuntu.com/questions/1152398/livepatch-fails-with-error-cannot-apply-patches-cannot-apply-update-cannot-ex

I am sorry, but I do not have a solution.

Remark:
"required key not available" is an error message that is shown when secure-boot is enabled, but an unsigned kernel module should be loaded. I do not know whether this is related to your case.

Revision history for this message
Andres Ounpuu (aoandres) said :
#22

YEP exactly the same problem...well ill look around for more forums, i appreciate your help...thank you for helping me figure this out,,,)

Can you help with this problem?

Provide an answer of your own, or ask Andres Ounpuu for more information if necessary.

To post a message you must log in.